Author of the publication

Trusted Execution Environments: A Look under the Hood.

, , and . MobileCloud, page 259-266. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Gharout, Said
add a person with the name Gharout, Said
 

Other publications of authors with the same name

Scalable Delay-constrained Multicast Group Key Management., , and . I. J. Network Security, 7 (2): 160-174 (2008)S-DV: A new approach to Secure Distance Vector routing protocols., , , and . SecureComm, page 1-10. IEEE, (2006)A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing., , , , , and . CoRR, (2015)Key management with host mobility in dynamic groups., , , and . SIN, page 186-194. ACM, (2010)Using ant colonies to solve data-mining problems., , , , , and . SMC (4), page 3151-3157. IEEE, (2004)M2M Security: Challenges and Solutions., , , and . IEEE Communications Surveys and Tutorials, 18 (2): 1241-1254 (2016)Practical and Privacy-Preserving TEE Migration., , , and . WISTP, volume 9311 of Lecture Notes in Computer Science, page 153-168. Springer, (2015)Trusted Execution Environments: A Look under the Hood., , and . MobileCloud, page 259-266. IEEE Computer Society, (2014)Private eCash in Practice (Short Paper)., , , , , and . Financial Cryptography, volume 9603 of Lecture Notes in Computer Science, page 99-109. Springer, (2016)Separate session key generation approach for network and application flows in LoRaWAN., , and . SAC, page 870-879. ACM, (2019)